directing station roaming in a cloud-managed Wi-Fi network. Management messages are received from a controller that is located remotely from the Wi-Fi communication network by an access point. When an rssi (received signal strength indication) value between the station and the access point falls below a threshold, the access point (i.e., controller access point) determines which neighboring access point would be a best fit for a hand-off, with limited real-time input form the cloud-based Wi-Fi controller. One of the two or more of the plurality of access points is selected for handing-off the station based on the rssi values received from the interrogation. Responsive to the selection, a message is sent to the selected access point instructing the one of the at least one of the plurality of access points to respond to messages from the station.
|
1. A computer-implemented method in an access point for directing station roaming in a cloud-managed Wi-Fi communication network, the method comprising the steps of:
receiving network wide management messages from a controller that is located remotely from the Wi-Fi communication network wherein the access point is one of a plurality of access points each managed by a controller located on an external network;
associating a station with the access point that serves as a controller access point for the station, wherein others of the plurality of access points serve as controller access points for other stations;
detecting that an rssi (received signal strength indication) value between the station and the access point falls below a threshold;
responsive to falling below the threshold, interrogating at least one of the plurality of access points for rssi values between the station and the two or more of the plurality of access points;
selecting one of the two or more of the plurality of access points for handing-off the station based on the combination of rssi values received from the interrogation and the network wide management messages;
responsive to the selection, sending a message to the selected access point, the message instructing the one of the at least one of the plurality of access points to respond to messages from the station,
wherein a different access point from the plurality of access points is appointed the controller access points, performs the above steps of the access point.
9. A non-transitory computer products medium storing source code that, when executed by a processor, performs a method in an access point for directing station roaming in a cloud-managed Wi-Fi communication network, the method comprising the steps of:
receiving network wide management messages from a controller that is located remotely from the Wi-Fi communication network wherein the access point is one of a plurality of access points each managed by a controller located on an external network;
associating a station with the access point that serves as a controller access point for the station, wherein others of the plurality of access points serve as controller access points for other stations;
detecting that an rssi (received signal strength indication) value between the station and the access point falls below a threshold;
responsive to falling below the threshold, interrogating at least one of the plurality of access points for rssi values between the station and the two or more of the plurality of access points;
selecting one of the two or more of the plurality of access points for handing-off the station based on the combination of rssi values received from the interrogation and the network wide management messages; and
responsive to the selection, sending a message to the selected access point, the message instructing the one of the at least one of the plurality of access points to respond to messages from the station,
wherein a different access point from the plurality of access points is appointed the controller access points, performs the above steps of the access point.
10. An access point for directing station roaming in a cloud-managed Wi-Fi communication network, the access point comprising:
a processor; and
a memory, storing:
a first module to receive network wide management messages from a controller that is located remotely from the Wi-Fi communication network wherein the access point is one of a plurality of access points each managed by a controller located on an external network;
a second module to associate a station with the access point that serves as a controller access point for the station, wherein others of the plurality of access points serve as controller access points for other stations;
a third module to detect that an rssi (received signal strength indication) value between the station and the access point falls below a threshold;
a fourth module to, responsive to falling below the threshold, interrogate at least one of the plurality of access points for rssi values between the station and the two or more of the plurality of access points;
a fifth module to select one of the two or more of the plurality of access points for handing-off the station based on the combination of rssi values received from the interrogation and the network wide management messages; and
a sixth module to, responsive to the selection, send a message to the selected access point, the message instructing the one of the at least one of the plurality of access points to respond to messages from the station,
wherein a different access point from the plurality of access points is appointed the controller access points, performs the above steps of the access point.
2. The method of
reducing power to the station to compel the station to initiate a hand-off.
3. The method of
receiving rssi values responsive to the interrogation.
4. The method of
receiving rssi values along with other local conditions responsive to the interrogation; and
selecting one of the two or more of the plurality of access points is based on a weighted combination of the rssi values and other local conditions received from the interrogation.
5. The method of
6. The method of
7. The method of
switching to a safety mode in which selection of access points for station roaming is returned to the cloud-based Wi-Fi controller.
8. The method of
|
The invention relates generally to computer networking, and more specifically, to directing how stations roam between access points in a Wi-Fi network managed from a cloud-based controller.
Increased reliability and speeds of the Internet has fueled the growth of cloud-based services. Rather than locally storing applications or owning physical devices for certain functions, an individual or commercial enterprise can access the services on-demands from cloud-based devices and storage. In particular, mobile devices, with limited processing power and storage capacity, are making use of the cloud. These devices operate under standards such as IEEE 802.11 (promulgated by the Institute of Electrical and Electronics Engineers), IEEE 802.3, and others.
In some enterprise networks, a local controller manages several access points that are dispersed around a physical area for designated radio coverage for mobile stations. The mobile stations detect beacons periodically sent out by the access points in order to connect for Internet access. The controller maintains communication with each of the access points in order to implement network-wide policies and manage BSSIDs for access points and stations. The controller also provides services such as virtual cell and virtual port, both of which allow the network to assert controls over stations operating under IEEE 802.11 which in standard operation, allows stations to have a lot of independence. For example, without controllers, stations control which access point to connect with, and when hand-offs between stations occur. By contrast, the controller allows the network to have some control over which access point connects with a station and when hand-offs occur.
Problematically, a cloud-based controller is not currently feasible because of the volume of communication necessary to maintain tight control over a network. For example, tunneling and virtual port service conventionally require constant communication between different access points and the controller. Despite the improved speed of the Internet, the increased flight time of a cloud solution with a high volume of communications for controllers can lead to intolerable delays.
What is needed is a robust technique in a communication network for cloud-based controllers to maintain control over an enterprise network, with limited communication.
These shortcomings are addressed by the present disclosure of methods, computer program products, and systems for directing station roaming in a cloud-managed Wi-Fi network.
In one embodiment, management messages are received from a controller that is located remotely from the Wi-Fi communication network by an access point. The access point is one of a plurality of access points, each managed by a controller located on an external network. A station is associated with the access point that serves as a controller access point for the station. Others of the plurality of access points serve as controller access points for other stations.
In one embodiment, when an RSSI (received signal strength indication) value between the station and the access point falls below a threshold, the access point (i.e., controller access point) determines which neighboring access point would be a best fit for a hand-off, with limited real-time input form the cloud-based Wi-Fi controller. Responsive to falling below the threshold, at least one of the plurality of access points is interrogated for RSSI values between the station and the two or more of the plurality of access points.
In still another embodiment, one of the two or more of the plurality of access points is selected for handing-off the station based on the RSSI values received from the interrogation. Responsive to the selection, a message is sent to the selected access point instructing the one of the at least one of the plurality of access points to respond to messages from the station
Advantageously, controllers can be implemented remotely to save enterprises the expense and administrative complexity of an on-site controller. Furthermore, third parties can provide controller functionality as a service. Additionally, geographically-dispersed enterprises can be centrally managed by a controller.
In the following drawings, like reference numbers are used to refer to like elements. Although the following figures depict various examples of the invention, the invention is not limited to the examples depicted in the figures.
The present invention provides methods, computer program products, and systems for directing station roaming in a cloud-managed Wi-Fi network. At a high-level, a controlling access point facilitates access point hand-offs locally to reduce communications necessary with a cloud-based controller. One of ordinary skill in the art will recognize that many other scenarios are possible, as discussed in more detail below.
Systems to Direct Roaming in a Cloud Managed Wi-Fi Network (
Embodiments of the system 100 can be implemented in conjunction with a network security system, for example, the FortiGate Network Security platform by Fortinet of Sunnyvale, Calif. In more detail, a firewall may examine communications with the cloud-based Wi-Fi controller 140 as communications with an external resource.
The enterprise network 101 can serve, for example, a business enterprise, a hospital or system of hospital, school, building, a private network, or the like. A combination of wired and wireless devices can be connected, as well as only wireless devices or only wired devices. The WAN 102 can be, for example, the Internet, a cellular network, or even a large enterprise network to which the enterprise network 101 is a smaller component of. In a preferred embodiment, the station 130 is coupled to the controller access point 110 over a wireless channel. The cloud-based Wi-Fi controller 140 is coupled to the WAN 102. Components can be directly connected or communicatively coupled through a network, despite the example of
The controller access point 110 substitutes for the cloud-based Wi-Fi controller 140 as an ad-hoc controller for a particular station by selecting a neighboring access point for the station while roaming around the enterprise network 101. As a result, real-time communication with the cloud-based Wi-Fi controller 140 can be reduced for speedier hand-offs while stations roam around the network. Previous techniques can concede all decision making to a local controller that manages services such as virtual cell and virtual port. In more detail, virtual cell makes the enterprise network 101 appear as a single BSSID so that the station 130 moves between best-serving access points without being aware of a change because a controller instructs which access points should respond to messages from the station 130. Virtual port provides additional control for the network by assigning a persistent and unique BSSID to the station 130 that is also handed-off between best-serving access points to match movements of the station 130. In a preferred embodiment, hand-offs are due to waning RSSI strengths at a current access point connection. Other factors that can fully or partially lead to hand-offs include, but are not limited to, interference, resource loads (e.g., processor, memory, queue), network congestion, load balancing, and the like. Furthermore, one embodiment implementing an SDN controller (not shown) can centralize layer 2, or data plane, decision making, and request a hand-off due to layer 2 conditions or policies.
Selection of the ad-hoc controller varies and specific policies can be promulgated by the cloud-based Wi-Fi controller 140 and periodically updated. In one embodiment, any of the access points 120A, B can also become ad-hoc controllers as controlled by network policies. One default implementation assigns the first access point to which a connection is made on the enterprise network 101 as the ad-hoc controller, an assignment that is maintained throughout a connection session. Another implementation assigns a currently connected access point as the ad-hoc controller, an assignment that dynamically changes throughout a connection session. Still another implementation assigns the ad-hoc controller for a station regardless of an actual connection to the station, for example, an access point dedicated to serving as an ad-hoc controller or an access point with the lowest current load. An additional implementation uses a random or rotational assignment.
In one embodiment, selection of the best neighboring access point varies and can be set by network policy set by the cloud-based Wi-Fi controller 140 or otherwise. For example, the controller access point 110 can request that neighboring access points 120A and 120B both measure local RSSI values to the station 130. The highest RSSI value can then be selected. Comparing
The cloud-based Wi-Fi controller 140 provides remote management of network Wi-Fi services. Having individual communication with each of the access points 110, 120A, B, management decisions can be made with network-wide considerations rather than allowing independent access points to make decisions selfishly based only local considerations. The remote location of the cloud-based Wi-Fi controller 140 allows powerful server configurations to support small businesses that do not want to purchase a local controller or do not want the network administration responsibilities. In other words, the remote architecture allows companies such a Meru Networks or Amazon to provide controllers as a service for a monthly rate. The remote location also allows for centralized management for an enterprise with one campus in Sunnyvale, Calif. and a second campus in Bangalore, India.
Using the current techniques, the cloud-based Wi-Fi controller 140 off-loads at least some real-time decision making that can be slowed up by network flight times. The level of off-loading varies in different implementations. The off-loading can be given to one access point or distributed among many. One mode, such as a safety mode, can be implemented to temporarily halt off-loading and forward all real-time decisions to the cloud-based Wi-Fi controller 140. All packets can also be tunneled, or forwarded, to the cloud-based Wi-Fi controller 140 for handling. This may be necessary to resolve conflicts between different ad-hoc controllers, to triage network errors, or otherwise. Distribution of rules, policies and updates of network conditions can be sent from the cloud-based Wi-Fi controller to enable off-loading. In one embodiment, distributions are sent to an SDN controller for layer 2 implementation of off-loading with OpenFlow rules (e.g., layer 2 steering of stations, or priority treatment of packets from certain stations).
The cloud-based Wi-Fi controller 140 can be implemented in any of the computing devices discussed herein (e.g., see
The access points 120A, B can be the same as controller access point 110, in some embodiments. Because the controller access point 110 can be relative to a particular station, each of the access points 120A, B can operate as ad-hoc controllers and the controller access point 110 can operate as a conventional access point. In other embodiments one or more of the access points 120A, B does not ever operate as an ad-hoc controller.
To provide network service to the station 130, in one embodiment, the access points 120A, B comply with IEEE 802.11 protocols (promulgated by the Institute of Electrical and Electronics Engineers) to provide Wi-Fi service to the station 130 over wireless communication channels. Under IEEE 802.11, a beacon with one or more BSSIDs is periodically sent to advertise a presence for new connections and maintain current connections. Then access points listen for packets addressed to associated BSSIDs and ignore packets addressed to unassociated BSSIDs. Furthermore, the access point 130 forward packets addressed to MAC (Media Access Control) addresses of associated stations.
The access points 120A, B include one or more individual access points implemented in any of the computing devices discussed herein (e.g., see
The station 130 can be, for example, a personal computer, a laptop computer, a tablet computer, a smart phone, a mobile computing device, a server, a cloud-based device, a virtual device, an Internet appliance, or any of the computing devices described herein (see e.g.,
The beacon generation module 210 generates beacons with embedded BSSIDs and parameters, according to IEEE 802.11 protocols. The station manager 220 stores globally and/or locally-influenced parameter values, policy-based parameter values, manually configured parameter values, or the like, for stations and/or BSSIDs. The ad-hoc controller module 230 communicates with the cloud-based Wi-Fi controller 140 for direction on BSSIDs, stations, to receive network-wide data, policies, and input on access point selection for hand-offs. The access point selector 240 interrogates neighboring access points and can apply factors such as network policy to determine a best fit for hand-offs of particular stations.
Methods for Directing Roaming in a Cloud Managed Wi-Fi Network (
A controller access point is assigned to a station (step 510). An access point is selected from multiple access points for handling-off the station based on RSSI values (step 520), as detailed below in association with
When an RSSI value between the station and the access point is detected below a threshold (step 610), a plurality of access points is interrogated for RSSI values between the station and each of the plurality of access points (step 620). An access point is selected for handing-off the station based on the RSSI values and, optionally, other local conditions (step 630). A message is sent to the selected access point for responding to messages from the station (step 640).
Generic Computing Device (
The computing device 700, of the present embodiment, includes a memory 710, a processor 720, a storage drive 730, and an I/O port 740. Each of the components is coupled for electronic communication via a bus 799. Communication can be digital and/or analog, and use any suitable protocol.
The memory 710 further comprises network applications 712 and an operating system 714. The network applications 712 can include the modules of the SDN controller access point 110, the access points 120A, B, the cloud-based Wi-Fi controller 140, or the station 130, as illustrated in
The operating system 714 can be one of the Microsoft Windows® family of operating systems (e.g., Windows 75, 78, Me, Windows NT, Windows 2000, Windows XP, Windows XP x64 Edition, Windows Vista, Windows CE, Windows Mobile, Windows 7 or Windows 8), Linux, HP-UX, UNIX, Sun OS, Solaris, Mac OS X, Alpha OS, AIX, IRIX32, or IRIX64. Other operating systems may be used. Microsoft Windows is a trademark of Microsoft Corporation.
The processor 720 can be a network processor (e.g., optimized for IEEE 802.11), a general purpose processor, an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA), a reduced instruction set controller (RISC) processor, an integrated circuit, or the like. Qualcomm Atheros, Broadcom Corporation, and Marvell Semiconductors manufacture processors that are optimized for IEEE 802.11 devices. The processor 720 can be single core, multiple core, or include more than one processing elements. The processor 720 can be disposed on silicon or any other suitable material. The processor 720 can receive and execute instructions and data stored in the memory 710 or the storage drive 730
The storage drive 730 can be any non-volatile type of storage such as a magnetic disc, EEPROM, Flash, or the like. The storage drive 730 stores code and data for applications.
The I/O port 740 further comprises a user interface 742 and a network interface 744. The user interface 742 can output to a display device and receive input from, for example, a keyboard. The network interface 744 (e.g. RF antennae) connects to a medium such as Ethernet or Wi-Fi for data input and output.
Many of the functionalities described herein can be implemented with computer software, computer hardware, or a combination.
Computer software products (e.g., non-transitory computer products storing source code) may be written in any of various suitable programming languages, such as C, C++, C#, Oracle® Java, JavaScript, PHP, Python, Perl, Ruby, AJAX, and Adobe® Flash®. The computer software product may be an independent application with data input and data display modules. Alternatively, the computer software products may be classes that are instantiated as distributed objects. The computer software products may also be component software such as Java Beans (from Sun Microsystems) or Enterprise Java Beans (EJB from Sun Microsystems).
Furthermore, the computer that is running the previously mentioned computer software may be connected to a network and may interface to other computers using this network. The network may be on an intranet or the Internet, among others. The network may be a wired network (e.g., using copper), telephone network, packet network, an optical network (e.g., using optical fiber), or a wireless network, or any combination of these. For example, data and other information may be passed between the computer and components (or steps) of a system of the invention using a wireless network using a protocol such as Wi-Fi (IEEE standards 802.11, 802.11a, 802.11b, 802.11e, 802.11g, 802.11i, 802.11n, and 802.11ac, just to name a few examples). For example, signals from a computer may be transferred, at least in part, wirelessly to components or other computers.
In an embodiment, with a Web browser executing on a computer workstation system, a user accesses a system on the World Wide Web (WWW) through a network such as the Internet. The Web browser is used to download web pages or other content in various formats including HTML, XML, text, PDF, and postscript, and may be used to upload information to other parts of the system. The Web browser may use uniform resource identifiers (URLs) to identify resources on the Web and hypertext transfer protocol (HTTP) in transferring files on the Web.
This description of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form described, and many modifications and variations are possible in light of the teaching above. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications. This description will enable others skilled in the art to best utilize and practice the invention in various embodiments and with various modifications as are suited to a particular use. The scope of the invention is defined by the following claims.
Patent | Priority | Assignee | Title |
10374814, | Jul 26 2016 | Extreme Networks, Inc | Access point cloud controller auto-discovery |
10917865, | May 17 2017 | Intel Corporation | Seamless and reliable chain of custody transfer over low power wireless protocol |
11246071, | Jun 28 2018 | SAGEMCOM BROADBAND SAS | Method for managing a connection in a distributed wireless network |
11277776, | Sep 28 2018 | SAGEMCOM BROADBAND SAS | Method for determining eligibility for a handover for a node in a distributed network |
11316946, | Nov 21 2016 | Intel Corporation | Processing and caching in an information-centric network |
11330420, | Mar 04 2019 | HUAWEI TECHNOLOGIES CO , LTD | Wireless local area network roaming method and communications apparatus |
11588932, | Feb 28 2019 | GOOGLE LLC | Activating a connected flight mode |
11706638, | May 20 2020 | ARRIS ENTERPRISES LLC | Optimized onboarding of devices in a wireless network |
11792752, | May 17 2017 | Intel Corporation | Seamless and reliable chain of custody transfer over low power wireless protocol |
Patent | Priority | Assignee | Title |
8707396, | May 12 2005 | SAMSUNG ELECTRONICS CO , LTD | Method and system for performing re-association due to handover in a WLAN mesh network |
8867342, | Jun 29 2012 | Extreme Networks, Inc | Adaptive standby access in a local area communication network |
8922344, | Oct 25 2012 | Symbol Technologies, LLC | Detecting rogue radio frequency based tags based on locationing |
9368024, | Sep 27 2013 | Apple Inc | Remote control configuration using a remote control profile |
20080198811, | |||
20090103503, | |||
20100085938, | |||
20120046063, | |||
20130089073, | |||
20130329700, | |||
20150124774, | |||
20150237519, | |||
20150295929, | |||
20160112886, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 17 2015 | KAUSHIK, ANIL | Meru Networks | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 036213 | /0179 | |
Jul 29 2015 | Fortinet, INC | (assignment on the face of the patent) | / | |||
Apr 01 2016 | MERU NETWORKS, INC | Fortinet, LLC | MERGER SEE DOCUMENT FOR DETAILS | 045112 | /0786 |
Date | Maintenance Fee Events |
Aug 24 2020 | REM: Maintenance Fee Reminder Mailed. |
Sep 30 2020 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Sep 30 2020 | M1554: Surcharge for Late Payment, Large Entity. |
Jul 03 2024 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Jan 03 2020 | 4 years fee payment window open |
Jul 03 2020 | 6 months grace period start (w surcharge) |
Jan 03 2021 | patent expiry (for year 4) |
Jan 03 2023 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 03 2024 | 8 years fee payment window open |
Jul 03 2024 | 6 months grace period start (w surcharge) |
Jan 03 2025 | patent expiry (for year 8) |
Jan 03 2027 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 03 2028 | 12 years fee payment window open |
Jul 03 2028 | 6 months grace period start (w surcharge) |
Jan 03 2029 | patent expiry (for year 12) |
Jan 03 2031 | 2 years to revive unintentionally abandoned end. (for year 12) |